13. Introduction to Threats, Attacks, and Exploits Quizzes

Introduction to Threats, Attacks, and Exploits Quizzes

Exploits

Consider this scenario: a malicious attacker may try to crack a password database and then use the results to gain unauthorized access into computer systems. What action this person is doing?

SOLUTION: Exploitation

Understanding Threats

Which of the following can be considered cybersecurity threats? (Pick all that apply)

SOLUTION:
  • Disgruntled Employee
  • User error
  • Hackers